CVE-2025-27579

5.4 MEDIUM

📋 TL;DR

This CVE describes a Cross-Site Request Forgery (CSRF) vulnerability in Bitaxe ESP-Miner with AxeOS firmware. Attackers can trick authenticated users into submitting malicious requests that change the miner's payout address or modify frequency/voltage settings. This affects Bitcoin miners running ESP-Miner firmware versions before 2.5.0.

💻 Affected Systems

Products:
  • Bitaxe ESP-Miner with AxeOS firmware
Versions: All versions before 2.5.0
Operating Systems: AxeOS (ESP32-based firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where the web interface is accessible and users are authenticated to the miner's management interface.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could redirect all mining rewards to their own wallet address, permanently stealing cryptocurrency earnings, or push hardware beyond safe limits causing physical damage to mining equipment.

🟠

Likely Case

Attackers redirect mining rewards to their own wallet addresses, stealing cryptocurrency earnings from affected miners.

🟢

If Mitigated

With proper CSRF protections and network segmentation, the attack surface is significantly reduced, though not completely eliminated if miners are exposed to untrusted networks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the victim to be logged into the miner's web interface and visit a malicious website. The vulnerability is well-documented with proof-of-concept available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.5.0

Vendor Advisory: https://github.com/skot/ESP-Miner/pull/637

Restart Required: Yes

Instructions:

1. Download ESP-Miner version 2.5.0 or later from the official repository. 2. Flash the new firmware to your Bitaxe device. 3. Restart the miner to apply the update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate mining equipment on separate network segments without internet access

Access Control

all

Restrict access to miner web interfaces using firewall rules or VPN access only

🧯 If You Can't Patch

  • Isolate mining equipment on a dedicated network segment without internet access
  • Implement strict firewall rules to only allow management from trusted IP addresses

🔍 How to Verify

Check if Vulnerable:

Check the firmware version in the miner's web interface under System Information. If version is below 2.5.0, the system is vulnerable.

Check Version:

Connect to miner web interface and navigate to System Information page

Verify Fix Applied:

After updating, verify the firmware version shows 2.5.0 or higher in the System Information page.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected changes to stratumUser/payout address in system logs
  • Unauthorized configuration changes to frequency/voltage settings

Network Indicators:

  • Unusual POST requests to /api/system endpoint from unexpected sources
  • Configuration changes originating from non-management IP addresses

SIEM Query:

source="miner_logs" AND (event="config_change" OR event="payout_change") AND user_agent CONTAINS "browser"

🔗 References

📤 Share & Export